A Secure Framework for Protecting Customer Collaboration in Intelligent Power Grids

Much interest and research have emerged to implement and improve the smart grid. The smart grid is the power infrastructure whose intellectual capability is enhanced with communication networks. In addition to communication networks, a bidirectional flow of both power and information enables the customers to actively participate in the whole procedure of power generation, transport, distribution, and consumption. In this paper, we propose the concept of collaborative customer to combine two or more customers into a single customer community, under which the customers collaborate on a power-sharing to reduce their expenditure for electricity power. However, the collaboration can be easily disrupted in the presence of malicious or selfish behaviors. In order to address the security issue, we present a brand-new security scheme, called the voucher scheme, for securely trading the right on power usage among members of a collaborative customer. When the voucher scheme is enabled, a power customer who wants to use extra power issues a certificate, called voucher that is immune to various security attacks, to a power customer who is willing to transfer its right on power usage to the former customer, so that both the customers can have monetary benefits. We formally define the security model for the voucher scheme and prove that the scheme is secure in the random oracle model. We then present a performance evaluation study to see the effectiveness of the scheme with respect to the benefit of the power-sharing and the robustness of the security. The study indicates that the proposed voucher scheme can promote a power trading for collaborative customer, protect the collaboration among customers from malicious or selfish behaviors, and consequently reduce the overproduction of electric power in the smart grid.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[3]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[4]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0 , 2010 .

[5]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[6]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[7]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[8]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[9]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[10]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  Wei Ren,et al.  SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[15]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[16]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..